Paving the Path for IoT Security Certification

The security certification of IoT (Internet of Things) devices is increasingly crucial in today’s technology-driven world. As IoT devices become more integrated into various aspects of daily life, from smart homes and wearable technology to industrial automation and healthcare, the need for robust security measures cannot be overstated.

In response to that, we present the work on our IoT Security Certification Guide, a modular and automatable framework to systematically assess the security of a very broad range of IoT devices that focuses on security certification of the devices at hand. In our presentation, we start to introduce the OWASP (Open Worldwide Application Security Project) IoT Security Testing Guide (ISTG), which aims to provide comprehensive insights into testing the security of IoT devices and systems. This guide is build up very modular and consists of a growing collection of test cases for various technologies related to IoT devices. Right now, the official test cases are on a very high and generic level as they should be applicable to as many different IoT devices as possible.

Then, to provide a basis for thorough security certification, we detail our modifications and extensions of the OWASP ISTG. First of all, we extend the basic IoT device model to capture properties of cloud backends and mobile apps, both concepts which are very prominent in the IoT world. Then, we introduce several new dimensions to the testing guide, to reflect that not all IoT devices deal with the same sensitive data, a security breach of IoT devices can have different levels of impact, and that verification can be done up to different confidence levels. Finally, we introduce an extensive analysis and certification process, in which we detail how the analysis which can lead to a successful certification has to be performed. Here, we focus on a step-by-step description guiding analysts through the process and enabling automation as far as possible.

The sheer number of IoT devices is growing exponentially. According to recent estimates, there will be over 75 billion connected IoT devices by 2025. This rapid increase creates a vast and expanding attack surface for malicious actors. Each new device added to a network presents a potential entry point for cyber threats. Then, many IoT devices collect and transmit highly sensitive data. In smart homes, devices monitor and control security systems, cameras, and personal information. In healthcare, IoT devices track patient health metrics and store critical medical data. The compromise of such data can lead to severe privacy violations, identity theft, and even endanger lives. Additionally, the threat landscape for IoT devices is continually evolving. Cyber attackers are becoming more sophisticated, employing advanced techniques to exploit vulnerabilities.

Furthermore, governments and regulatory bodies worldwide are recognizing the critical need to enforce stringent security measures on IoT devices. In response to the growing risks, several countries have enacted laws and regulations aimed at enhancing IoT security. For instance, the European Commission’s delegated act to the Radio Equipment directive, aims: “to make sure that all wireless devices are safe before being sold on the EU market. This act lays down new legal requirements for cybersecurity safeguards, which manufacturers will have to take into account in the design and production of the concerned products.” Similarly, the United States has introduced the IoT Cybersecurity Improvement Act, which sets baseline security standards for IoT devices used by federal agencies.

How to control the compliance to these regulations is neither openly addresse nor solved. Security certification ensures that these devices comply with stringent data protection standards, safeguarding sensitive information from unauthorized access. Security certification provides a framework for continuous monitoring and updating of security measures. This proactive approach ensures that IoT devices can adapt to emerging threats, maintaining their integrity and the trust of users.

Unfortunately, assessing the security of IoT devices is inherently challenging due to the vast heterogeneity of these devices. IoT devices range from simple sensors and consumer gadgets like smart speakers to complex industrial machinery and medical equipment. This diversity means that a one-size-fits-all approach to security is impractical. To address these challenges, a multi-faceted approach is necessary. Developing standardized security frameworks and guidelines tha can be adapted to various device types is crucial. Furthermore, automatizing both security testing and certification as far as possible is key to deal with the heterogeneity of IoT devices.

Although, we have not yet fully implemented and automated every aspect of our analysis and certification pipeline, our IoT Security Certification Guide lays the foundation for a solid and automated IoT security testing and thus an efficient certification process.

In conclusion, the security certification of IoT devices is ever more important due to the increasing number of devices, the sensitivity of the data they handle, the potential for large-scale disruptions, and the evolving nature of cyber threats. Ensuring that IoT devices are secure through rigorous certification processes protects not only the devices themselves but also the broader networks they are part of and the individuals who rely on them. As the IoT ecosystem continues to expand, prioritizing security certification will be essential to fostering a safe and resilient digital environment. With our IoT Security Certification Guide, we develop a method to systematically assess the security of IoT devices that is, due to its modularity, easily extensible and automatable to address the challenges specific to IoT ecosystems.

Martin Nocker – MCI The Entrepreneurial School

Martin Nocker is currently a PhD student at the University of Rostock, Germany, focusing on advanced topics in electrical and computer engineering. His research interests lie in the security and privacy of machine learning. In addition, he serves as a research assistant at MCI The Entrepreneurial School in Innsbruck, Austria, where he is a member of the Josef Ressel Center for Security Analysis of IoT Devices. His research includes exploring secure machine learning applications in IoT and IoT device security in general.

Pascal Schöttle – MCI The Entrepreneurial School

Pascal Schöttle is a professor for IT Security and Machine Learning at the department Digital Business & Software Engineering at MCI – The Entrepreneurial School in Innsbruck, Austria. He leads the Josef Ressel Centre for Security Analysis of IoT Security. His research interests include adversarial machine learning, IoT security, and multimedia security. Pascal received the M.Sc. degree in IT security from Ruhr-University Bochum, Germany, in 2011, and the Ph.D. degree in computer science from the University of Münster, Germany, in 2014. He spend a semester with Pennsylvania State University, USA, in 2013. He was a Post-Doctoral Researcher with the University of Innsbruck, Austria, from 2015 to 2018.